Verifying constant-time implementations by abstract interpretation. Blazy, S., Pichardie, D., & Trieu, A. Journal of Computer Security, 27(1):137–163, 2019.
Paper doi bibtex @article{DBLP:journals/jcs/BlazyPT19,
author = {Sandrine Blazy and
David Pichardie and
Alix Trieu},
title = {Verifying constant-time implementations by abstract interpretation},
journal = {Journal of Computer Security},
volume = {27},
number = {1},
pages = {137--163},
year = {2019},
url = {https://doi.org/10.3233/JCS-181136},
doi = {10.3233/JCS-181136},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/jcs/BlazyPT19},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"mu9NsEj2EG8ghnspA","bibbaseid":"blazy-pichardie-trieu-verifyingconstanttimeimplementationsbyabstractinterpretation-2019","downloads":0,"creationDate":"2019-01-21T17:06:09.714Z","title":"Verifying constant-time implementations by abstract interpretation","author_short":["Blazy, S.","Pichardie, D.","Trieu, A."],"year":2019,"bibtype":"article","biburl":"https://dblp.org/pid/174/4816.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Sandrine"],"propositions":[],"lastnames":["Blazy"],"suffixes":[]},{"firstnames":["David"],"propositions":[],"lastnames":["Pichardie"],"suffixes":[]},{"firstnames":["Alix"],"propositions":[],"lastnames":["Trieu"],"suffixes":[]}],"title":"Verifying constant-time implementations by abstract interpretation","journal":"Journal of Computer Security","volume":"27","number":"1","pages":"137–163","year":"2019","url":"https://doi.org/10.3233/JCS-181136","doi":"10.3233/JCS-181136","timestamp":"Wed, 25 Sep 2019 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/jcs/BlazyPT19","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/jcs/BlazyPT19,\n author = {Sandrine Blazy and\n David Pichardie and\n Alix Trieu},\n title = {Verifying constant-time implementations by abstract interpretation},\n journal = {Journal of Computer Security},\n volume = {27},\n number = {1},\n pages = {137--163},\n year = {2019},\n url = {https://doi.org/10.3233/JCS-181136},\n doi = {10.3233/JCS-181136},\n timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/jcs/BlazyPT19},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Blazy, S.","Pichardie, D.","Trieu, A."],"key":"DBLP:journals/jcs/BlazyPT19","id":"DBLP:journals/jcs/BlazyPT19","bibbaseid":"blazy-pichardie-trieu-verifyingconstanttimeimplementationsbyabstractinterpretation-2019","role":"author","urls":{"Paper":"https://doi.org/10.3233/JCS-181136"},"downloads":0},"search_terms":["verifying","constant","time","implementations","abstract","interpretation","blazy","pichardie","trieu"],"keywords":[],"authorIDs":["597b27ac4f2ff86d35000006"],"dataSources":["MTdibT9ofedcPwCXh"]}